-
Notifications
You must be signed in to change notification settings - Fork 218
Enable to give aws credentials file via value #1306
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
/lgtm |
| decryptServiceAccount: | ||
| fileName: sealed-secret-gcpkms-decrypt-service-account | ||
| data: "" | ||
| awsCredentials: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should we put this inside an imageProvider block?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You intend to clearly distinguish from other use cases (e.g. Lambda Deployment), right? If so, agree with you!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes. That is the point.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Okay 👍
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Then we have to configure credentials for each use-case for specific requirements? 🤔
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hmm... on second thought I'm begging to feel we don't have to distinguish them as @khanhtc1202 may consider. In the general case, a piped operator prepares an AWS IAM user for piped and attach needed roles. I'd say it's an edge case to separate users by features.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
(FYI: the Go SDK for AWS is load credentials from the environment variables by default. It must be shared in a single process.)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Got it. 👍
|
/approve |
What this PR does / why we need it:
With it we can set the credentials with
--set-file secret.awsCredentials.data=/path/toWhich issue(s) this PR fixes:
Fixes #
Does this PR introduce a user-facing change?: